Public Date:
507717: CVE-2009-0692 dhclient: stack overflow leads to arbitrary code execution as root

The MITRE CVE dictionary describes this issue as:

Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option.

Find out more about CVE-2009-0692 from the MITRE CVE dictionary dictionary and NIST NVD.


This issue affected the dhcp packages as shipped with Red Hat Enterprise Linux 3 and 4. Updated packages to correct this issue are available via Red Hat Network:

This issue did not affect the dhcp packages as shipped with Red Hat Enterprise Linux 5 due to the use of FORTIFY_SOURCE protection mechanism that changes the exploitability of the issue into a controlled application termination.

CVSS v2 metrics

Base Score 8.3
Base Metrics AV:A/AC:L/Au:N/C:C/I:C/A:C
Access Vector Adjacent Network
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 4 (dhcp) RHSA-2009:1136 2009-07-14
Red Hat Enterprise Linux 3 (dhcp) RHSA-2009:1154 2009-07-14
Red Hat Enterprise Linux Extended Update Support 4.7 (dhcp) RHSA-2009:1136 2009-07-14

Last Modified

CVE description copyright © 2017, The MITRE Corporation


Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.